An Investigation into Filtering of Search Results by Access Constraints Gert Schmeltz Pedersen and Christian Tønsberg Technical Information Technical.

Slides:



Advertisements
Similar presentations
NRL Security Architecture: A Web Services-Based Solution
Advertisements

An Evaluation of Solutions to Filtering of Search Results by Access Constraints Gert Schmeltz Pedersen and Christian Tønsberg Technical Information Center.
Administrative Policies in XACML Erik Rissanen Swedish Institute of Computer Science.
New Challenges for Access Control April 27, Improving Usability and Expressiveness with Dynamic Policies and Obligations Dennis Kafura Markus Lorch.
Approaches to generalization of XACML New challenges for access control 27 th April 2005 Tim Moses.
Data Segmentation Model 17 Jan 2012 John (Mike) Davis HL7 Security Co-Chair.
Access Control Patterns & Practices with WSO2 Middleware Prabath Siriwardena.
Authz work in GGF David Chadwick
16/3/2015 META ACCESS MANAGEMENT SYSTEM Implementing Authorised Access Dr. Erik Vullings MAMS Programme Manager
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
Chapter 3 The Relational Model Transparencies © Pearson Education Limited 1995, 2005.
Chapter 3. 2 Chapter 3 - Objectives Terminology of relational model. Terminology of relational model. How tables are used to represent data. How tables.
XACML By Ganesh Godavari Craig Peltier. Information Sharing Information Sharing relates to the sharing of information between two or more entities. Entities.
Audumbar. Access control and privacy Who can access what, under what conditions, and for what purpose.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
XACML Gyanasekaran Radhakrishnan. Raviteja Kadiyam.
XACML 2.0 in the Enterprise: Use- Cases and Deployment Challenges Prateek Mishra, Frank Villavicencio, Rich Levinson Oracle Identity Management Group 02/07/2006.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
XACML OASIS eXtensible Access Control Markup Language Steve Carmody July 10, 2003 Steve Carmody July 10, 2003.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
CSC271 Database Systems Lecture # 6. Summary: Previous Lecture  Relational model terminology  Mathematical relations  Database relations  Properties.
Chapter 4 The Relational Model Pearson Education © 2014.
Chapter 4 The Relational Model.
Chapter 3 The Relational Model Transparencies Last Updated: Pebruari 2011 By M. Arief
James Cabral, David Webber, Farrukh Najmi, July 2012.
Differentiated Access to Virtual Resources in Cloud Environments M. Fazio and A. Puliafito Euro-TM Workshop.
Chapter 3 The Relational Model. 2 Chapter 3 - Objectives u Terminology of relational model. u How tables are used to represent data. u Connection between.
Fedora and GSearch in a Research Project about Integrated Search Open Repositories 2009 Gert Schmeltz Pedersen DTU Library, Technical Information Center.
1-1 System Development Process System development process – a set of activities, methods, best practices, deliverables, and automated tools that stakeholders.
Storing Organizational Information - Databases
11 Usage policies for end point access control  XACML is Oasis standard to express enterprise security policies with a common XML based policy language.
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp - SWITCH EGI TF Prague.
1 GT XACML Authorization Rachana Ananthakrishnan Argonne National Laboratory.
Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.
Proposal for RBAC Features for SDD James Falkner Sun Microsystems October 11, 2006.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks gLite Authorization Service: Technical Overview.
Model Checking Grid Policies JeeHyun Hwang, Mine Altunay, Tao Xie, Vincent Hu Presenter: tanya levshina International Symposium on Grid Computing (ISGC.
SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1.
A Standards-Based Approach for Supporting Dynamic Access Policies for a Federated Digital Library K. Bhoopalam, K. Maly, F. McCown, R. Mukkamala, M. Zubair.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
11 Restricting key use with XACML* for access control * Zack’-a-mul.
Fedora Content Modeling for Improved Services for Research Databases Open Repositories 2009 Mikael Karstensen Elbæk Alfred Heller Gert Schmeltz Pedersen.
1 Access Control Policies: Modeling and Validation Luigi Logrippo & Mahdi Mankai Université du Québec en Outaouais.
Introducing WI Proposal about Authorization Architecture and Policy Group Name: WG4 Source: Wei Zhou, Datang, Meeting Date: Agenda Item:
Introducing WI Proposal about Authorization Architecture and Policy Group Name: WG4 Source: Wei Zhou, Datang, Meeting Date: Agenda Item:
An answer to your common XACML dilemmas Asela Pathberiya Senior Software Engineer.
EMI INFSO-RI Argus Policies in Action Valery Tschopp (SWITCH) on behalf of the Argus PT.
The Relational Model. 2 Relational Model Terminology u A relation is a table with columns and rows. –Only applies to logical structure of the database,
Old Dominion University1 eXtensible Access Control Markup Language [OASIS Standard] Kailash Bhoopalam Java and XML.
EMI INFSO-RI Argus The EMI Authorization Service Valery Tschopp (SWITCH) Argus Product Team.
Policy Management for OGSA Applications as Grid Services Lavanya Ramakrishnan.
The Relational Model © Pearson Education Limited 1995, 2005 Bayu Adhi Tama, M.T.I.
Chapter 4 The Relational Model Pearson Education © 2009.
XACML Contributions Hal Lockhart, Oracle Corp. 2 Topics Authorization API Finding Input Attributes.
Access Control Policy Languages in XML Lê Anh Vũ Võ Thành Vinh
Authorization PDP GE Course (R4) FIWARE Chapter: Security FIWARE GE: Authorization PDP FIWARE GEri: AuthZForce Authorization PDP Owner: Cyril Dangerville,
Fedora Service Framework Sandy Payette, Executive Director UK Fedora Training London January 22-23, 2009.
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp (SWITCH) – Argus Product Team.
OGSA Attributes: Requirements, Definitions, and SAML Profile Abstract This document specifies elements and vocabulary for expressing attribute assertions.
RSP Fedora training days January 2009 Richard Green
UNICORE and Argus integration Krzysztof Benedyczak ICM / UNICORE Security PT.
19 Copyright © 2008, Oracle. All rights reserved. Security.
XACML and the Cloud.
Argus Authorization Service Security Training
Chapter 4 The Relational Model Pearson Education © 2009.
Argus The EMI Authorization Service
Chapter 4 The Relational Model Pearson Education © 2009.
Groups and Permissions
Access Control Slide Set #4 Textbook Chapter 4 Clicker Questions
Views Base Relation View
Presentation transcript:

An Investigation into Filtering of Search Results by Access Constraints Gert Schmeltz Pedersen and Christian Tønsberg Technical Information Technical University of Denmark funded by the DEFF Fedora project Investigation triggered by discussion on fedora-commons-developers list in January 2008

Overview ➲ The Problem is... ➲ Analysis... The ideal solution is... What can you do with XACML policies? A cost model for alternative solutions to filtering of search results... What are decisive characteristics of repositories for the choice of solution? ➲ The Conclusion is...

The Problem is... ➲ Search results contain hits that the user does not have the access rights to see This has become a problem for repositories that want fine-grained control over access rights and want to use XACML policies with Fedora e.g. eSciDoc, RepoMMan /REMAP XACML = OASIS eXtensible Access Control Markup Language

Analysis... ➲ The ideal solution ➲ What can you do with XACML policies? ➲ What are the costs of various solutions to filtering of search results? ➲ What are the characteristics of repositories that are decisive for the choice of solution?

The Ideal Solution... ➲ The ideal solution includes: Choice between 1.all search result hits 2.only hits accessible by the user 1.with “read” filtering 2.( with “edit” filtering (subset of 2.1) )‏ Filtering mechanism must correspond to XACML access control mechanism Hits in “read” filtering must be readable by user ( Hits in “edit” filtering must be editable by user )‏ Objects readable by user must not be filtered out of 2.1 ( Objects editable by user must not be filtered out of 2.2 )‏ Normal paging of hits for the Choice Show number of hits for the Choice Supported for large number of users / (“virtual”) user groups Acceptable performance Search result without filtering 2Qwe rty uio pas 4Qwe rty uio pas 5Qwe rty uio pas Abstract example of Foxml objects 1Qwe rty uio pas 2Qwe rty uio pas 3Qwe rty uio pas 4Qwe rty uio pas 5Qwe rty uio pas User1 Search result with “read” filtering 2Qwe rty uio pas 4Qwe rty uio pas User2 Search result with “read” filtering 2Qwe rty uio pas 5Qwe rty uio pas User1 Search result with “edit” filtering - 4Qwe rty uio pas User2 Search result with “edit” filtering - 5Qwe rty uio pas

What can you do with XACML policies? Repository-wide policy demo examples deny-apia-to-ldap-group.xml DENY access to all API-A methods to users who are “Librarians” or “Info Technologists” (as indicated by their LDAP attributes). deny-apia-if-not-tomcat-role.xml This policy will DENY access to all API-A methods to users who are NOT in the “administrator” or “professor” ROLES. deny-apia-except-by-owner.xml DENY access to all API-A methods to any user unless that user is the owner of the object being accessed. deny-objects-hide-datastreams-if-not-tomcat-role.xml The overall intent of this policy is datastream hiding, meaning that raw datastreams must not be accessible to anyone except very privileged users. Object-specific policy demo example Object-specific policies are policies that refer to one particular digital object. An object-specific policy is stored in the "POLICY" datastream of the digital object to which it pertains. demo-5.xml By using multiple policy rules, this policy shows how to DENY access to all raw datastreams in the object except to particular users (e.g., the object owners). It also shows how to DENY access to a particular dissemination to selected user roles.

What can you do with XACML policies? urn:fedora:names:fedora:2.1:action:api-a administrator professor

What can you do with XACML policies? Policy decision point (PDP) - The system entity that evaluates applicable policy and renders an authorization decision. Policy enforcement point (PEP) - The system entity that performs access control, by making decision requests and enforcing authorization decisions. Policy administration point (PAP) - The system entity that creates a policy or policy set Policy information point (PIP) - The system entity that acts as a source of attribute values e.g.authentication (AuthN) providing user attributes authorization (AuthZ)‏

Three Alternatives - Basically ➲ Post-search filtering - after search, ask deny/permit for each hit in the page - after a deny, add hit to page - no exact hit count until the end Search result - 2Qwe rty uio - 4Qwe rty uio 5Qwe rty uio Index 1Qwe rty uio 2Qwe rty uio 3Qwe rty uio 4Qwe rty uio 5Qwe rty uio Filtering 2Qwe rty uio 4Qwe rty uio 5Qwe rty uio Index 1Qwe rty uio abc 2Qwe rty uio def 3Qwe rty uio ghi 4Qwe rty uio jkl 5Qwe rty uio mno Search result - 2Qwe rty uio - 4Qwe rty uioas 5Qwe rty uioas Index 1Qwe rty uio 2Qwe rty uio 3Qwe rty uio 4Qwe rty uio 5Qwe rty uio Search result - 2Qwe rty uio def - 4Qwe rty uio jkl 5Qwe rty uio mno XACML deny for red user => filter out XACML deny for green user => filter out ➲ In-search filtering - logical partitioning of index - adding index fields corresponding to XACML user attributes - adding query conditions similarly (query rewrite)‏ - how-to verify correspondence? ➲ Pre-search filtering - physical partitioning of index - each index contains only accessible objects - at search, no filtering

Cost Model

The Conclusion is... ➲... rather inconclusive ➲ Problem more complex than anticipated ➲ Three alternative “solutions” no one close to the ideal solution ➲ Cost model indicated importance of characteristics ➲ Compromises necessary Choices depend on repository and usage characteristics Tailored application-specific shortcuts necessary ➲ Fez / FezACML – simplified XACML ➲ RAMP / muradora : XACML+GSearch post-search filtering ➲ DEFF Fedora experiment with GSearch and hybrid of pre-search and in-search filtering